The Community for Technology Leaders
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007) (2007)
Vienna, Austria
Sept. 10, 2007 to Sept. 10, 2007
ISBN: 0-7695-2982-8

Preface (PDF)

pp. vii-viii
Invited Paper

Securing Flash Technology (Abstract)

Helena Handschuh , Spansion EMEA, France
Elena Trichina , Spansion Internat. Inc., Germany
pp. 3-20
Session 1: Fault Attacks against Public Key Cryptosystems

How can we overcome both side channel analysis and fault attacks on RSA-CRT? (Abstract)

Chong Hee Kim , Universite Catholique de Louvain, Belgium
Jean-Jacques Quisquater , Universite Catholique de Louvain, Belgium
pp. 21-29

Montgomery Multiplication with Redundancy Check (Abstract)

Khanh Nguyen , FPT Software, Vietnam
Michael Tunstall , University College Cork, Ireland
pp. 30-36

Fault Detection Structures for the Montgomery Multiplication over Binary Extension Fields (Abstract)

Arash Hariri , The University of Western Ontario, Canada
Arash Reyhani-Masoleh , The University of Western Ontario, Canada
pp. 37-46
Session 2: Fault Attacks against AES Implementations

A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard (Abstract)

Mehran Mozaffari-Kermani , The University of Western Ontario, Canada
Arash Reyhani-Masoleh , The University of Western Ontario, Canada
pp. 47-53

A Novel Double-Data-Rate AES Architecture Resistant against Fault Injection (Abstract)

P. Maistri , TIMA Laboratory, France
P. Vanhauwaert , TIMA Laboratory, France
R. Leveugle , TIMA Laboratory, France
pp. 54-61

DFA Mechanism on the AES Key Schedule (Abstract)

Junko Takahashi , NTT Corporation, Japan
Toshinori Fukunaga , NTT Corporation, Japan
Kimihiro Yamakoshi , NTT Corporation, Japan
pp. 62-74
Session 3: Countermeasures and Attack Techniques

Countermeasures Against Branch Target Buffer Attacks (Abstract)

Giovanni Agosta , Politecnico di Milano, Italy
Luca Breveglieri , Politecnico di Milano, Italy
Gerardo Pelosi , Universita degli Studi di Bergamo, Italy
Israel Koren , University of Massachusetts, Amherst, USA
pp. 75-79

Cheap Hardware Parallelism Implies Cheap Security (Abstract)

Onur Aciicmez , Samsung Information Systems America, USA
Jean-Pierre Seifert , Samsung Information Systems America, USA; University of Innsbruck, Austria
pp. 80-91

Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis (Abstract)

Frederic Amiel , GEMALTO, France
Karine Villegas , GEMALTO, France
Benoit Feix , INSIDE CONTACTLESS, France
Louis Marcel , K2CRYPT
pp. 92-102
Session 4: Fault Attacks against ECC Implementations

Tate Pairing with Strong Fault Resiliency (Abstract)

Erdinc Ozturk , Worcester Polytechnic Institute, USA
Gunnar Gaubatz , Intel Corporation, USA
Berk Sunar , Worcester Polytechnic Institute, USA
pp. 103-111

Register Transfer Level Concurrent Error Detection in Elliptic Curve Crypto Implementations (Abstract)

Richard Stern , L3 Communications
Nikhil Joshi , Citibank
Kaijie Wu , University of Illinois, Chicago, USA
Ramesh Karri , Polytechnic University, USA
pp. 112-119
Author Index

Author Index (PDF)

pp. 120
95 ms
(Ver 3.3 (11022016))